ISO/IEC 18035:2003
$36.40
Information technology — Icon symbols and functions for controlling multimedia software applications
Published By | Publication Date | Number of Pages |
ISO | 2003-02 | 28 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
ISO/IEC 18035:2002 defines a consistent set of icons and related functions that are represented by multimedia applications on a computer screen and that users interact with to control such applications. It describes controls applying to such functions as: Play, Pause, Stop, Rewind, Scan forward, Scan backward, Replay backward, Loop, Go to beginning, Go to previous, Go to next, Go to end, Set volume and Mute.
Each control icon is specified with the following:
- Primary function
- Specific instance
- Components
- Graphic
Multimedia control icons enable users to invoke functions that act upon a pre-selected or default objects. Functions initiated by these icons may also be available via text commands on menus. Multimedia icons provide direct access to functions by graphically representing those text commands.
Published Code | ISO |
---|---|
Published By | International Organization for Standardization |
Publication Date | 2003-02 |
Pages Count | 28 |
Language | English |
Edition | 1 |
File Size | 399.4 KB |
ICS Codes | 35.240.20 - IT applications in office work |
Related products
-
BS ISO/IEC 18033-2:2006+A1:2017:2018 Edition
Information technology. Security techniques. Encryption algorithms – Asymmetric ciphers Published By Publication Date Number of…
-
BS EN ISO/IEC 18045:2020
Information technology. Security techniques. Methodology for IT security evaluation Published By Publication Date Number of…
-
BS ISO/IEC 18045:2008:2014 Edition
Information technology. Security techniques. Methodology for IT security evaluation Published By Publication Date Number of…
-
CAN/CSA-ISO/IEC 18031:13:2013 Edition
Information technology – Security techniques – Random bit generation Published By Publication Date Number of…
-
CAN/CSA-ISO/IEC 18033-4:13:2013 Edition
Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers Published By…
-
CSA ISO/IEC 15408-1:10 (R2020):2010 Edition
Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction…
-
ISO/IEC TR 20004:2012
Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC…
-
BS ISO/IEC 18033-3:2005:2008 Edition
Information technology. Security techniques. Encryption algorithms – Block ciphers Published By Publication Date Number of…
-
ISO/IEC 10116:2006
Information technology — Security techniques — Modes of operation for an n-bit block cipher Published…
-
CAN/CSA-ISO/IEC 18033-1:16:2016 Edition
Information technology – Security techniques – Encryption algorithms – Part 1: General Published By Publication…
-
ISO/IEC 18033-2:2006
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers Published By…
-
BS ISO/IEC 18045:2005
Information technology. Security techniques. Methodology for IT security evaluation Published By Publication Date Number of…
-
ISO/IEC 18033-1:2005/Amd 1:2011
Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1…
-
ISO/IEC 18036:2003
Information technology — Icon symbols and functions for World Wide Web browser toolbars Published By…
-
ISO/IEC 18033-2:2006/Amd 1:2017
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment…
-
BS ISO/IEC 18033-1:2005+A1:2011
Information technology. Security techniques. Encryption algorithms – General Published By Publication Date Number of Pages…
-
BS ISO/IEC 18032:2005
Information technology. Security techniques. Prime number generation Published By Publication Date Number of Pages BSI…
-
ISO/IEC 15946-5:2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5:…
-
CSA ISO/IEC TR 18037:09 (R2019):2009 Edition
Programming languages – C – Extensions to support embedded processors Published By Publication Date Number…
-
DIN EN ISO/IEC 15408-1:2020 Edition
Informationstechnik – IT-Sicherheitsverfahren – Evaluationskriterien für IT-Sicherheit – Teil 1: Einführung und allgemeines Modell Published…
-
ISO/IEC TR 22216:2022
Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and…
-
DIN EN ISO/IEC 18045:2021 Edition
Informationstechnik – Sicherheitstechniken – Methodik für die Bewertung der IT-Sicherheit Published By Publication Date Number…
-
AS/NZS ISO/IEC 18033.2:2008
Information technology – Security techniques – Encryption algorithms – Part 2: Asymmetric ciphers Published By…
-
CAN/CSA-ISO/IEC 18033-3:12:2012 Edition
Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers Published By…
-
BS ISO/IEC 18033-4:2005+A1:2009:2010 Edition
Information technology. Security techniques. Encryption algorithms – Stream ciphers Published By Publication Date Number of…
-
BS EN ISO 16035:2005:2006 Edition
Animal and vegetable fats and oils. Determination of low-boiling halogenated hydrocarbons in edible oils Published…
-
CSA ISO/IEC 18045:09 (R2019):2009 Edition
Information technology – Security techniques – Methodology for IT security evaluation Published By Publication Date…
-
ISO/TR 19038:2005
Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines…
-
ISO/IEC 18033-1:2005
Information technology — Security techniques — Encryption algorithms — Part 1: General Published By Publication…
-
CSA ISO/IEC 14888-2:09 (R2019):2009 Edition
Information technology – Security techniques – Digital signatures with appendix – Part 2: Integer factorization-based…
-
BSI PD ISO/IEC TR 18037:2004
Programming languages. C. Extensions to support embedded processors Published By Publication Date Number of Pages…
-
BSI 23/30425946 DC 2023
BS ISO/IEC 18031 Information technology. Security techniques. Random bit generation Published By Publication Date Number…
-
AS/NZS ISO/IEC 18033.3:2006
Information technology – Security techniques – Encryption algorithms – Block ciphers Published By Publication Date…
-
ISO/IEC 18032:2005
Information technology — Security techniques — Prime number generation Published By Publication Date Number of…
-
CSA ISO/IEC 18032:21:2021 Edition
Information security — Prime number generation Published By Publication Date Number of Pages CSA 2021…
-
BSI PD ISO/IEC TR 18037:2008
Programming languages. C. Extensions to support embedded processors Published By Publication Date Number of Pages…
-
AS/NZS ISO/IEC 18033.1:2006
Information technology – Security techniques – Encryption algorithms – General Published By Publication Date Number…
-
AS/NZS ISO/IEC 18033.4:2006
Information technology – Security techniques – Encryption algorithms – Stream ciphers Published By Publication Date…
-
BS ISO 18935:2005:2008 Edition
Imaging materials. Colour images on paper prints. Determination of indoor water resistance of printed colour…
-
BS ISO/IEC 18031:2005:2009 Edition
Information technology. Security techniques. Random bit generation Published By Publication Date Number of Pages BSI…